T-Mobile Tracker Glitch Exposes Locations of Random Children to Other Users - 1

Image by Mike Mozart, from Flickr

T-Mobile Tracker Glitch Exposes Locations of Random Children to Other Users

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

A significant privacy issue emerged with T-Mobile’s SyncUP tracking app, revealing the names, photos, and exact locations of random children across the U.S. instead of showing parents their own kids.

In a rush? Here are the quick facts:

  • Affected parents saw real-time updates of unknown children’s locations, including schools.
  • Social media users reported similar problems with T-Mobile’s SyncUP DRIVE car tracker.
  • T-Mobile claimed the issue was caused by a system update and is now resolved.

The issue, first reported by 404 Media , affected multiple users, raising serious concerns about data security and child safety.

Jenna, a parent who uses SyncUP to monitor her three-year-old and six-year-old, logged in expecting to see if her kids had left school but was instead shown the real-time locations of eight unknown children.

“I would log in and I couldn’t see my children but I could see a kid in California. I refreshed and would see a different child.” Jenna said, as reported by 404 Media.

Screenshots provided by Jenna to 404 Media confirmed that children’s profile pictures, names, and last known locations—including schools—were visible to other users. Alarmed by the situation, she immediately contacted T-Mobile support.

“As a mother, this is super alarming to me, and I raised flags right away [with T-Mobile] and nobody took me seriously there,” she said, as reported by 404 Media.

In a recorded call with T-Mobile, a customer support representative admitted the company was aware of the issue but offered no immediate solution.

“We are now aware of the problem and we’re trying to find a way to fix it,” the representative said, as reported by 404 Media. “We’ll just need to wait for a little bit,” he added.

Jenna also emailed T-Mobile for further clarification but received no response, as reported by 404 Media.

After 404 Media published the story, T-Mobile’s crisis communications manager, Bennet Ladyman, acknowledged the issue.

“Yesterday we fully resolved a temporary system issue with our SyncUP products that resulted from a planned technology update. We are in the process of understanding potential impacts to a small number of customers and will reach out to any as needed. We apologize for any inconvenience.” Ladyman stated, as reported by 404 Media.

However, Jenna was not alone. Similar complaints flooded social media, with parents reporting that they, too, had been shown random children’s locations instead of their own. Additionally, users of T-Mobile’s SyncUP DRIVE—a car tracking device—reported that their app was randomly displaying other people’s vehicles instead of their own.

This incident highlights the risks associated with location-tracking technology. Similar breaches have occurred before, including a 2023 incident where users of Ubiquiti surveillance cameras were shown live feeds from other people’s homes.

While Jenna’s SyncUP tracker appeared to be functioning correctly again on Wednesday, the security lapse has left many parents questioning the reliability of T-Mobile’s tracking services.

Fake Job Emails Used to Spread BeaverTail Malware - 2

Image by Brett Jordan, from Unsplash

Fake Job Emails Used to Spread BeaverTail Malware

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

A new cyberattack is targeting job seekers by using fake recruitment emails to spread malware disguised as harmless developer files.

In a rush? Here are the quick facts:

  • Hackers impersonated recruiters to spread malware via fake developer projects.
  • Attackers used BitBucket links to trick victims into downloading files.
  • Tropidoor backdoor can steal data, take screenshots, and run commands.

Cybersecurity experts at ASEC , who first identified this malware, explain that this incident represents an increasing tactic where attackers disguise themselves as either recruiters or members of developer communities.

The incident first emerged on November 29, 2024 when hackers used Dev.to’s identity to pose as the platform’s developers.

The attackers sent emails containing BitBucket code repository links which they asked users to review the project. The project files contained hidden malware which was disguised as ordinary project files.

The fake files included two major threats: a JavaScript-based malware called BeaverTail , disguised as a “tailwind.config.js” file, and a second component called car.dll, which acts as a downloader. When opened, these files work together to steal login details, browser data, and even cryptocurrency wallet information.

“BeaverTail is known to be distributed primarily in phishing attacks disguised as job offers,” researchers at ASEC explained. Previous versions of this attack were spotted on platforms like LinkedIn .

The malware poses a significant threat because it disguises its actual purpose by mimicking standard system operations. The malware employs PowerShell and rundll32 tools which are standard Windows utilities to evade detection by antivirus software.

After penetrating a system the malware retrieves and executes Tropidoor which functions as an advanced backdoor. The tool establishes encrypted connections with remote servers while executing more than 20 different commands that include file deletion and program code injection and screenshot capture.

“Tropidoor… collects basic system information and generates a random 0x20 byte key, which is encrypted with an RSA public key,” researchers said. This secure connection lets hackers control infected machines without being noticed.

Security teams urge everyone to remain very vigilant at this time. Be wary of unexpected recruitment emails especially those with links to code repositories or those asking you to download project files. Always check with the official company before opening any content.